whitepaper

Results 1926 - 1950 of 1998Sort Results By: Published Date | Title | Company Name
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper describes the formal and informal file-sharing methods business employees use to perform their daily functions and explains that, from sending small text documents to multi-gigabyte video files, the right managed file transfer (MFT) solution can allow such transfers to continue without risking the security of the corporate network. The paper explains that the right MFT solution can enable business growth, enhance operational efficiency, enable compliance, reduce costs, and increase ROI. Choosing the right MFT solution requires eight considerations described in the paper, and concludes by explaining why Globalscape solutions are the choice of our customers around the world.
Tags : 
    
Globalscape
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the "Bring Your Own Device" (BYOD) movement, from carrying around a floppy disk to today's "cloud" services. This paper explains that employees may not be aware that their file transfer methods can cause a risk to security. Ways to ensure that employees can securely send files without risking corporate data security and what that dangers are with BYOD transfers are also discussed. Recent security breaches are referenced in the paper, and why such attacks are expected to continue into the future. The paper concludes with a description of how companies can ensure data security and how Globalscape's secure file transfer products meet and exceed that need.
Tags : 
byod, dropbox, google drive, file transfer, file sharing, mft, mobile security, data protection, internet security, network security, data security, eft, mail express
    
Globalscape
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the way in which enterprise mobility has both increased employee productivity and decreased the security of corporate networks. The paper discusses the challenges IT managers have with controlling the "Bring Your Own Device" (BYOD) trend to allow mobile users to have access to the corporate network. Explained in the paper is the limit to visibility and control of file transfers when employees use ad hoc methods, and that educating employees on proper data access is not enough to protect the corporate network. The paper concludes by describing how Globalscape's EFT™ and Tappin™ can provide mobile access, without compromising security and controls over file sharing.
Tags : 
mobile, mobile access, remote access, byod, smartphones, tablets, laptops, ad hoc, file sharing, on-premises control, eft, tappin, sma, secure mobile access, mft
    
Globalscape
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally. The paper explains that no manually handling of files, such as with USB drives, is unnecessary when you set up a secure network architecture using five zones of protection. You can transfer files to and from your network around the globe, and know the data and the network are secure, automatically scanning files to block dangerous data while allowing "clean" data into the network. The paper notes several reasons why it matters that data is secure while remaining accessible.
Tags : 
viruses, malware, hackers, leaks, supply chain interruptions, stuxnet, scada, usb, multi-zone architecture, dmz
    
Globalscape
Published By: Windstream     Published Date: Apr 23, 2013
Organizations should gain several advantages from server virtualization and cloud computing that will improve their overall ROI. This whitepaper discusses the best approach to saving precious IT budgets.
Tags : 
windstream, windstream communications, cloud computing, virtualization, server virtualization, roi, operational budget
    
Windstream
Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
Published By: HPE     Published Date: Nov 05, 2014
See what 300 enterprise IT decision makers feel are the most important areas of infrastructure optimization for the technology trends of Mobility, Cloud and Big Data. Download this whitepaper now.
Tags : 
business value, investment decisions, infrastructure, business expectations, it organizations, drive innovation, rethink it
    
HPE
Published By: CradlePoint     Published Date: Sep 04, 2014
Whether your businesses are connected to the Internet via T1/T3, DSL or Cable, incorporating a mobile broadband backup solution adds uptime whenever there is a loss in connectivity via your wired line. With CradlePoint routers as your Internet backup solution, you're ensured more uptime for your POS transactions and cloud-based services while gaining significant financial and operational benefits over wired backup solutions including: better reliability, lower operating costs, greater ease of use and management, and quicker speed to deployment. Please download the whitepaper to learn more!
Tags : 
cradlepoint, business continuity, dsl, internet service, t1 or t3 line, distributed enterprises
    
CradlePoint
Published By: Dun & Bradstreet     Published Date: Feb 03, 2016
Better customer data management increases marketing ROI.” Easy to say, but not so easy to prove. This whitepaper provides everything you need to build a business case for customer data management, including: What organizational data maturity is and how it benefits the business Actual performance outcomes of data-mature organizations Data maturity’s quantifiable impact on targeting, nurturing and close
Tags : 
    
Dun & Bradstreet
Published By: Epicor Software     Published Date: Nov 25, 2014
This whitepaper identifies eight ideas on how to deliver more value to your customers in a completely different way.
Tags : 
enterprise resource planning, erp, erp system, software, software implementation, software solution, upgrade software, distribution, distribution software, crm
    
Epicor Software
Published By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
As software-defined WAN (SD-WAN) continues to become a mainstream technology, its relationship to WAN Optimization (WANop) must be examined. At first glance, the two can appear alike, and are often erroneously mentioned as synonymous technologies. A deeper examination however, will reveal two distinct and highly complementary technologies with very limited feature overlap. This document aims to demystify the relationship between the two, outline the market shifts that have led to a reduced WANop sector, and provide a recommendation on deploying both technologies in a modern enterprise WAN.
Tags : 
    
VMware SD-WAN by VeloCloud
Published By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
As organizations prioritize digital transformation initiatives, many are finding that legacy networks are holding them back. To support new business models, cloud adoption, and an explosion in connected devices, modern networks must support interoperability across data centers, multiple clouds, branch locations, and edge devices. Applications now run at every point on this spectrum, and they are critical to businesses’ ability to win in hypercompetitive marketplaces. Yet, even as business success has become more dependent on this new architecture, and the amount of data flowing across connections has increased, many organizations still lack a unified approach to management, automation, and security
Tags : 
    
VMware SD-WAN by VeloCloud
Published By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
Digital transformation has moved out of the early-adopter phase and into mainstream adoption. According to the ZK Research 2018 IT Priorities Study, 88% of businesses now have digital initiatives underway, up from 84% in 2017. The urgency of IT and business leaders is well warranted, as companies that master being digital will leapfrog the competition and be able to sustain a market-leading position. Those that lag in their digital initiatives will fall farther behind and will struggle to survive. The key to digital success is having an agile IT foundation that enables businesses to adapt to market transitions faster than the competition. However, there is no single technology called “digital transformation.” Rather, it is powered by the following four key enabling technologies:
Tags : 
    
VMware SD-WAN by VeloCloud
Published By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
The Wide Area Network (WAN) is in the midst of a significant evolution. Software-defined WAN (SD-WAN) is the key factor driving this evolution and bringing along with it many transformational changes. SD-WAN has enabled several new WAN uses cases, such as enabling reliable, secure and high performance support of software-as-a-service (SaaS), cloud compute, cloud storage, cloud security and the ability to use non-deterministic Internet services to provide business-class transport. The traditional WAN architecture was ill equipped to support these new use cases. As is usually the case with an emerging market, the first entrants into the SD-WAN space were start-ups. However, given the ability of SD-WAN to support both traditional and emerging WAN use cases, the market has recently been flooded with a range of vendors, solutions and technologies offering varying types of SD-WAN solutions. While having differing types of solutions provided by numerous suppliers is potentially beneficial, it
Tags : 
    
VMware SD-WAN by VeloCloud
Published By: CA Technologies     Published Date: Jun 03, 2015
In the Application Economy, speed, innovation, and quality, have become table stakes. If you can’t meet your customers’ expectations, they will surely find a competitor who can. Whether your organization is in one of the sectors facing the most intense digital competition (like insurance, banking, telecommunications or retail), or a more traditional industry, how rapidly and successfully you embrace a software-driven digital transformation strategy will likely have a profound effect on your organization’s long term viability. In this Whitepaper, learn how the Application Economy is driving Digital Transformation in companies, and how you can position your organization for success.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
In the Application Economy, speed, innovation, and quality, have become table stakes. If you can’t meet your customers’ expectations, they will surely find a competitor who can. Whether your organization is in one of the sectors facing the most intense digital competition (like insurance, banking, telecommunications or retail), or a more traditional industry, how rapidly and successfully you embrace a software-driven digital transformation strategy will likely have a profound effect on your organization’s long term viability. In this Whitepaper, learn how the Application Economy is driving Digital Transformation in companies, and how you can position your organization for success.
Tags : 
    
CA Technologies
Published By: Mimecast     Published Date: Jun 25, 2015
In this whitepaper, Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization, see exactly what happens before, during and after an attack, all the mistakes that made you vulnerable, and how you can get ready for it.
Tags : 
mimecast, social media, spear-phishing, data breach, personalized emails, network defenses
    
Mimecast
Published By: mavisliew     Published Date: Feb 04, 2015
In this whitepaper, you’ll find some practical advice on how you can demonstrate your value to the C-suite and gain that all-important seat at the boardroom table.
Tags : 
    
mavisliew
Published By: VMware AirWatch     Published Date: Nov 12, 2015
Today’s savviest enterprises are leveraging BYOD as a tool to drive mobile accessibility, increase IT oversight and enable employees to complete a business task at a moment’s notice, on whichever device is nearby. This whitepaper will outline the basic measures business leaders and IT professionals are taking to turn their BYOD programs into major productivity gains.
Tags : 
byod, vmware, productivity, it management, mobile accessibility
    
VMware AirWatch
Published By: PeopleFluent     Published Date: Oct 07, 2015
While generalizations and opinions abound, viewpoints from this Digital Generation that pertain to talent management are less common. Download this whitepaper to learn more about these young professionals and what works best to attract, motivate, and retain them.
Tags : 
digital generation, millennials, digital natives, talent management, retention, talent, recruitment, employment opportunities
    
PeopleFluent
Published By: MuleSoft     Published Date: Jan 18, 2018
Today, government IT teams are expected to deliver more services with fewer resources. Consequently, many agencies have prioritized legacy modernization, interoperability, and shared service models as a means towards increasing IT delivery capacity. We propose that successful execution of these initiatives within the confines of a strictly managed budget requires a new approach to integration, one centered around APIs. Our recommended approach, API-led connectivity, builds on the principles of re-use first outlined by SOA, while avoiding many of the pitfalls that limited the success of heavyweight SOA implementations. In this whitepaper, you will learn: What forces drive digital transformation in federal government, and what role integration plays in supporting digital transformation How a civilian federal agency leveraged APIs to modernize legacy systems and accelerate the speed of integration How to build out an API-led architecture within a government agency to accelerate project
Tags : 
    
MuleSoft
Published By: MuleSoft     Published Date: Jan 18, 2018
Today, government IT teams are expected to deliver more services with fewer resources. Consequently, many agencies have prioritized legacy modernization, interoperability, and shared service models as a means towards increasing IT delivery capacity. We propose that successful execution of these initiatives within the confines of a strictly managed budget requires a new approach to integration, one centered around APIs. Our recommended approach, API-led connectivity, builds on the principles of re-use first outlined by SOA, while avoiding many of the pitfalls that limited the success of heavyweight SOA implementations. In this whitepaper, you will learn: What forces drive digital transformation in federal government, and what role integration plays in supporting digital transformation How a civilian federal agency leveraged APIs to modernize legacy systems and accelerate the speed of integration How to build out an API-led architecture within a government agency to accelerate project
Tags : 
    
MuleSoft
Published By: MuleSoft     Published Date: Apr 15, 2019
The future of financial services is under pressure from profound digital disruption. Across the globe, there are forces, both regulatory and customer-led, that open up the market to new entrants and disrupt what customers are buying — and how. The advent of Open Banking is one major influence, with Open APIs paving the way for third-party developers to build applications and services independently. This whitepaper outlines the challenges facing financial services firms and how a new approach to enterprise integration — API-led connectivity — can help banks and financial services firms not only survive, but thrive in an increasingly competitive future. Download this whitepaper to learn: What financial services firms should do about Open Banking, based on the experiences of the impact of PSD2 in Europe How an API strategy could define the future of financial services How a global bank successfully completed a digital transformation initiative
Tags : 
    
MuleSoft
Published By: Oracle     Published Date: Oct 29, 2015
Many companies that sell online direct to consumers are evaluating whether they can better achieve their revenue and growth goals by either shifting their e-commerce infrastructure to the cloud, or by migrating to a more flexible and scalable SaaS solution that doesn't limit their growth. But what are some of the key considerations as you evaluate your options? Download this whitepaper to learn the 3 keys to igniting your business growth as you consider SaaS commerce solutions.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 29, 2015
With a powerful, modern cloud commerce solution, e-commerce sites don’t need to sacrifice functionality, customization, or site experience to gain agility. Download this whitepaper to learn four key considerations to keep in mind when evaluating SaaS commerce solutions to achieve agility without compromise.
Tags : 
    
Oracle
Start   Previous    66 67 68 69 70 71 72 73 74 75 76 77 78 79 80    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.